As businesses continue to spend upwards of $120 billion on advanced cybersecurity solutions each year ($170 billion projected to be spent by the year 2020) to protect information and sensitive data, it becomes increasingly more disappointing to see how many breaches...

Credential stuffing is a popular method of cyber attack that may be affecting your company without you ever being aware of it. As the culprit of large data hacks, like Yahoo, who won the title of both being victim of the first and second largest credential spills ever...

Today is Safer Internet Day! You may be thinking “Great, another unofficial, meaningless day on which I still have to go to work like ‘Ice Cream for Breakfast Day.'” (That’s a real day actually). What you should be thinking is “Great!...

As events continue to unfold in the world of cybersecurity, we felt it necessary to share our thoughts and views on the ever-changing landscape of data breach monitoring. It’s a relatively new concept that is seen as controversial, dangerous and in some instances,...

Yesterday, Yahoo announced to the world that 500 million customer credentials were hacked back in 2014 — making it the largest hack in history. The announcement comes after a renowned hacker named “Peace” said that he was selling a Yahoo database of over 200...

The Apple vs FBI situation has a lot of people considering whether or not they want to encrypt phone information on their personal smartphone. If you’re pro phone encryption, we’ve got the “How to” covered. You may be asking, “What is...